Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
21-05-2024 06:27
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
ffe19694997fcd6aada399dfadd400cdac7cd209e7088a92732c260e2b3de7c6.exe
Resource
win7-20240419-en
windows7-x64
6 signatures
150 seconds
General
-
Target
ffe19694997fcd6aada399dfadd400cdac7cd209e7088a92732c260e2b3de7c6.exe
-
Size
78KB
-
MD5
7e9f546800476298078e9ca76e7d10e6
-
SHA1
7c717a0835f0a596527bbf310b062b00693aed8b
-
SHA256
ffe19694997fcd6aada399dfadd400cdac7cd209e7088a92732c260e2b3de7c6
-
SHA512
fea20a965da0db5377dead9fc23e920ec05a6e05af6977add72f0d016af47cb888a1f1889be685729f9d181ee2df5a0782cd2f01f2299423fedaf7d9841b5052
-
SSDEEP
1536:9Q8hoOAesfYvcyjfS3H9yl8Q1pmdBcxedLxNDIYgC/KSLJEd2arzla:ymb3NkkiQ3mdBjFI3eFC/rzk
Malware Config
Signatures
-
Detect Blackmoon payload 25 IoCs
Processes:
resource yara_rule behavioral2/memory/4500-5-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3764-18-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2724-11-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/552-25-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2272-35-0x0000000000401000-0x0000000000427000-memory.dmp family_blackmoon behavioral2/memory/2272-34-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1660-39-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4592-53-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3392-66-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4480-70-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4656-78-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3460-88-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2456-94-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/4396-100-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2088-107-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3184-112-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1356-124-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/668-136-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1240-148-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/1596-159-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/2932-166-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3528-184-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3048-190-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3520-196-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon behavioral2/memory/3796-205-0x0000000000400000-0x0000000000429000-memory.dmp family_blackmoon -
UPX dump on OEP (original entry point) 29 IoCs
Processes:
resource yara_rule behavioral2/memory/4500-5-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3764-18-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2724-11-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/552-25-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2272-34-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1660-39-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3244-46-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3392-61-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3392-60-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4592-53-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3392-66-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4480-70-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4656-76-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4656-78-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4656-77-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3460-88-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2456-94-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/4396-100-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2088-107-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3184-112-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1356-124-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/668-136-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1240-148-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/1596-159-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/2932-166-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3528-184-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3048-190-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3520-196-0x0000000000400000-0x0000000000429000-memory.dmp UPX behavioral2/memory/3796-205-0x0000000000400000-0x0000000000429000-memory.dmp UPX -
Executes dropped EXE 64 IoCs
Processes:
nbhhhh.exe3lxrrrr.exexfflflf.exejjpvj.exepvjdd.exehbhntt.exentbnhh.exepppvv.exerrfrxfr.exevvvjj.exeppjdv.exe1hhhhn.exevddjj.exerxllxxf.exebhbbnn.exebbnnnn.exeflffxxx.exexxfffll.exebtttbh.exejjjjp.exe5xfflrr.exenbnttt.exeppvvp.exejvjjd.exeflxrrrl.exentbbnn.exe1dvpd.exefrfxxrr.exebnnnhh.exetnbttt.exepjdjv.exerxrrxfx.exe1ffxrxr.exetntbtb.exehntnbb.exejdpvj.exexrxffll.exelrrxlfl.exe5hnhhb.exebbnnhn.exepjppj.exeflrrlrx.exetnhhhh.exejjjvv.exerfffxff.exerlllfxx.exetbnhhh.exepjvvv.exevjjvj.exellxxxrl.exexlxrrrf.exebthhhb.exevvvpd.exedddvv.exexxxllll.exebhhbtb.exehhbbtt.exejdjjd.exedddvp.exeffxfrrl.exerrffrrf.exenthhbb.exevvvvp.exevpdvv.exepid process 2724 nbhhhh.exe 3764 3lxrrrr.exe 552 xfflflf.exe 2272 jjpvj.exe 1660 pvjdd.exe 3244 hbhntt.exe 4592 ntbnhh.exe 3392 pppvv.exe 4480 rrfrxfr.exe 4656 vvvjj.exe 3460 ppjdv.exe 2456 1hhhhn.exe 4396 vddjj.exe 2088 rxllxxf.exe 3184 bhbbnn.exe 4648 bbnnnn.exe 1356 flffxxx.exe 1100 xxfffll.exe 668 btttbh.exe 3360 jjjjp.exe 1240 5xfflrr.exe 2124 nbnttt.exe 1596 ppvvp.exe 2932 jvjjd.exe 1616 flxrrrl.exe 4276 ntbbnn.exe 3528 1dvpd.exe 3048 frfxxrr.exe 3520 bnnnhh.exe 3796 tnbttt.exe 2604 pjdjv.exe 3956 rxrrxfx.exe 2560 1ffxrxr.exe 4072 tntbtb.exe 4232 hntnbb.exe 4760 jdpvj.exe 1632 xrxffll.exe 4164 lrrxlfl.exe 3136 5hnhhb.exe 4496 bbnnhn.exe 1912 pjppj.exe 4220 flrrlrx.exe 4968 tnhhhh.exe 2476 jjjvv.exe 392 rfffxff.exe 4216 rlllfxx.exe 2988 tbnhhh.exe 1392 pjvvv.exe 4592 vjjvj.exe 4092 llxxxrl.exe 3308 xlxrrrf.exe 1972 bthhhb.exe 2292 vvvpd.exe 2268 dddvv.exe 5024 xxxllll.exe 1064 bhhbtb.exe 1952 hhbbtt.exe 4636 jdjjd.exe 1060 dddvp.exe 3184 ffxfrrl.exe 2488 rrffrrf.exe 1356 nthhbb.exe 3328 vvvvp.exe 4192 vpdvv.exe -
Processes:
resource yara_rule behavioral2/memory/4500-5-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3764-18-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2724-11-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/552-25-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2272-34-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1660-39-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3244-46-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3392-61-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3392-60-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4592-53-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3392-66-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4480-70-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4656-76-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4656-78-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4656-77-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3460-88-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2456-94-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/4396-100-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2088-107-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3184-112-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1356-124-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/668-136-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1240-148-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/1596-159-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/2932-166-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3528-184-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3048-190-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3520-196-0x0000000000400000-0x0000000000429000-memory.dmp upx behavioral2/memory/3796-205-0x0000000000400000-0x0000000000429000-memory.dmp upx -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
ffe19694997fcd6aada399dfadd400cdac7cd209e7088a92732c260e2b3de7c6.exenbhhhh.exe3lxrrrr.exexfflflf.exejjpvj.exepvjdd.exehbhntt.exentbnhh.exepppvv.exerrfrxfr.exevvvjj.exeppjdv.exe1hhhhn.exevddjj.exerxllxxf.exebhbbnn.exebbnnnn.exeflffxxx.exexxfffll.exebtttbh.exejjjjp.exe5xfflrr.exedescription pid process target process PID 4500 wrote to memory of 2724 4500 ffe19694997fcd6aada399dfadd400cdac7cd209e7088a92732c260e2b3de7c6.exe nbhhhh.exe PID 4500 wrote to memory of 2724 4500 ffe19694997fcd6aada399dfadd400cdac7cd209e7088a92732c260e2b3de7c6.exe nbhhhh.exe PID 4500 wrote to memory of 2724 4500 ffe19694997fcd6aada399dfadd400cdac7cd209e7088a92732c260e2b3de7c6.exe nbhhhh.exe PID 2724 wrote to memory of 3764 2724 nbhhhh.exe 3lxrrrr.exe PID 2724 wrote to memory of 3764 2724 nbhhhh.exe 3lxrrrr.exe PID 2724 wrote to memory of 3764 2724 nbhhhh.exe 3lxrrrr.exe PID 3764 wrote to memory of 552 3764 3lxrrrr.exe xfflflf.exe PID 3764 wrote to memory of 552 3764 3lxrrrr.exe xfflflf.exe PID 3764 wrote to memory of 552 3764 3lxrrrr.exe xfflflf.exe PID 552 wrote to memory of 2272 552 xfflflf.exe jjpvj.exe PID 552 wrote to memory of 2272 552 xfflflf.exe jjpvj.exe PID 552 wrote to memory of 2272 552 xfflflf.exe jjpvj.exe PID 2272 wrote to memory of 1660 2272 jjpvj.exe pvjdd.exe PID 2272 wrote to memory of 1660 2272 jjpvj.exe pvjdd.exe PID 2272 wrote to memory of 1660 2272 jjpvj.exe pvjdd.exe PID 1660 wrote to memory of 3244 1660 pvjdd.exe hbhntt.exe PID 1660 wrote to memory of 3244 1660 pvjdd.exe hbhntt.exe PID 1660 wrote to memory of 3244 1660 pvjdd.exe hbhntt.exe PID 3244 wrote to memory of 4592 3244 hbhntt.exe ntbnhh.exe PID 3244 wrote to memory of 4592 3244 hbhntt.exe ntbnhh.exe PID 3244 wrote to memory of 4592 3244 hbhntt.exe ntbnhh.exe PID 4592 wrote to memory of 3392 4592 ntbnhh.exe pppvv.exe PID 4592 wrote to memory of 3392 4592 ntbnhh.exe pppvv.exe PID 4592 wrote to memory of 3392 4592 ntbnhh.exe pppvv.exe PID 3392 wrote to memory of 4480 3392 pppvv.exe rrfrxfr.exe PID 3392 wrote to memory of 4480 3392 pppvv.exe rrfrxfr.exe PID 3392 wrote to memory of 4480 3392 pppvv.exe rrfrxfr.exe PID 4480 wrote to memory of 4656 4480 rrfrxfr.exe vvvjj.exe PID 4480 wrote to memory of 4656 4480 rrfrxfr.exe vvvjj.exe PID 4480 wrote to memory of 4656 4480 rrfrxfr.exe vvvjj.exe PID 4656 wrote to memory of 3460 4656 vvvjj.exe ppjdv.exe PID 4656 wrote to memory of 3460 4656 vvvjj.exe ppjdv.exe PID 4656 wrote to memory of 3460 4656 vvvjj.exe ppjdv.exe PID 3460 wrote to memory of 2456 3460 ppjdv.exe 1hhhhn.exe PID 3460 wrote to memory of 2456 3460 ppjdv.exe 1hhhhn.exe PID 3460 wrote to memory of 2456 3460 ppjdv.exe 1hhhhn.exe PID 2456 wrote to memory of 4396 2456 1hhhhn.exe vddjj.exe PID 2456 wrote to memory of 4396 2456 1hhhhn.exe vddjj.exe PID 2456 wrote to memory of 4396 2456 1hhhhn.exe vddjj.exe PID 4396 wrote to memory of 2088 4396 vddjj.exe rxllxxf.exe PID 4396 wrote to memory of 2088 4396 vddjj.exe rxllxxf.exe PID 4396 wrote to memory of 2088 4396 vddjj.exe rxllxxf.exe PID 2088 wrote to memory of 3184 2088 rxllxxf.exe bhbbnn.exe PID 2088 wrote to memory of 3184 2088 rxllxxf.exe bhbbnn.exe PID 2088 wrote to memory of 3184 2088 rxllxxf.exe bhbbnn.exe PID 3184 wrote to memory of 4648 3184 bhbbnn.exe bbnnnn.exe PID 3184 wrote to memory of 4648 3184 bhbbnn.exe bbnnnn.exe PID 3184 wrote to memory of 4648 3184 bhbbnn.exe bbnnnn.exe PID 4648 wrote to memory of 1356 4648 bbnnnn.exe flffxxx.exe PID 4648 wrote to memory of 1356 4648 bbnnnn.exe flffxxx.exe PID 4648 wrote to memory of 1356 4648 bbnnnn.exe flffxxx.exe PID 1356 wrote to memory of 1100 1356 flffxxx.exe xxfffll.exe PID 1356 wrote to memory of 1100 1356 flffxxx.exe xxfffll.exe PID 1356 wrote to memory of 1100 1356 flffxxx.exe xxfffll.exe PID 1100 wrote to memory of 668 1100 xxfffll.exe btttbh.exe PID 1100 wrote to memory of 668 1100 xxfffll.exe btttbh.exe PID 1100 wrote to memory of 668 1100 xxfffll.exe btttbh.exe PID 668 wrote to memory of 3360 668 btttbh.exe jjjjp.exe PID 668 wrote to memory of 3360 668 btttbh.exe jjjjp.exe PID 668 wrote to memory of 3360 668 btttbh.exe jjjjp.exe PID 3360 wrote to memory of 1240 3360 jjjjp.exe 5xfflrr.exe PID 3360 wrote to memory of 1240 3360 jjjjp.exe 5xfflrr.exe PID 3360 wrote to memory of 1240 3360 jjjjp.exe 5xfflrr.exe PID 1240 wrote to memory of 2124 1240 5xfflrr.exe nbnttt.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ffe19694997fcd6aada399dfadd400cdac7cd209e7088a92732c260e2b3de7c6.exe"C:\Users\Admin\AppData\Local\Temp\ffe19694997fcd6aada399dfadd400cdac7cd209e7088a92732c260e2b3de7c6.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4500 -
\??\c:\nbhhhh.exec:\nbhhhh.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2724 -
\??\c:\3lxrrrr.exec:\3lxrrrr.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3764 -
\??\c:\xfflflf.exec:\xfflflf.exe4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:552 -
\??\c:\jjpvj.exec:\jjpvj.exe5⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2272 -
\??\c:\pvjdd.exec:\pvjdd.exe6⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1660 -
\??\c:\hbhntt.exec:\hbhntt.exe7⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3244 -
\??\c:\ntbnhh.exec:\ntbnhh.exe8⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4592 -
\??\c:\pppvv.exec:\pppvv.exe9⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3392 -
\??\c:\rrfrxfr.exec:\rrfrxfr.exe10⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4480 -
\??\c:\vvvjj.exec:\vvvjj.exe11⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4656 -
\??\c:\ppjdv.exec:\ppjdv.exe12⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3460 -
\??\c:\1hhhhn.exec:\1hhhhn.exe13⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2456 -
\??\c:\vddjj.exec:\vddjj.exe14⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4396 -
\??\c:\rxllxxf.exec:\rxllxxf.exe15⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2088 -
\??\c:\bhbbnn.exec:\bhbbnn.exe16⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3184 -
\??\c:\bbnnnn.exec:\bbnnnn.exe17⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4648 -
\??\c:\flffxxx.exec:\flffxxx.exe18⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1356 -
\??\c:\xxfffll.exec:\xxfffll.exe19⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1100 -
\??\c:\btttbh.exec:\btttbh.exe20⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:668 -
\??\c:\jjjjp.exec:\jjjjp.exe21⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3360 -
\??\c:\5xfflrr.exec:\5xfflrr.exe22⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1240 -
\??\c:\nbnttt.exec:\nbnttt.exe23⤵
- Executes dropped EXE
PID:2124 -
\??\c:\ppvvp.exec:\ppvvp.exe24⤵
- Executes dropped EXE
PID:1596 -
\??\c:\jvjjd.exec:\jvjjd.exe25⤵
- Executes dropped EXE
PID:2932 -
\??\c:\flxrrrl.exec:\flxrrrl.exe26⤵
- Executes dropped EXE
PID:1616 -
\??\c:\ntbbnn.exec:\ntbbnn.exe27⤵
- Executes dropped EXE
PID:4276 -
\??\c:\1dvpd.exec:\1dvpd.exe28⤵
- Executes dropped EXE
PID:3528 -
\??\c:\frfxxrr.exec:\frfxxrr.exe29⤵
- Executes dropped EXE
PID:3048 -
\??\c:\bnnnhh.exec:\bnnnhh.exe30⤵
- Executes dropped EXE
PID:3520 -
\??\c:\tnbttt.exec:\tnbttt.exe31⤵
- Executes dropped EXE
PID:3796 -
\??\c:\pjdjv.exec:\pjdjv.exe32⤵
- Executes dropped EXE
PID:2604 -
\??\c:\rxrrxfx.exec:\rxrrxfx.exe33⤵
- Executes dropped EXE
PID:3956 -
\??\c:\1ffxrxr.exec:\1ffxrxr.exe34⤵
- Executes dropped EXE
PID:2560 -
\??\c:\tntbtb.exec:\tntbtb.exe35⤵
- Executes dropped EXE
PID:4072 -
\??\c:\hntnbb.exec:\hntnbb.exe36⤵
- Executes dropped EXE
PID:4232 -
\??\c:\jdpvj.exec:\jdpvj.exe37⤵
- Executes dropped EXE
PID:4760 -
\??\c:\xrxffll.exec:\xrxffll.exe38⤵
- Executes dropped EXE
PID:1632 -
\??\c:\lrrxlfl.exec:\lrrxlfl.exe39⤵
- Executes dropped EXE
PID:4164 -
\??\c:\5hnhhb.exec:\5hnhhb.exe40⤵
- Executes dropped EXE
PID:3136 -
\??\c:\bbnnhn.exec:\bbnnhn.exe41⤵
- Executes dropped EXE
PID:4496 -
\??\c:\pjppj.exec:\pjppj.exe42⤵
- Executes dropped EXE
PID:1912 -
\??\c:\flrrlrx.exec:\flrrlrx.exe43⤵
- Executes dropped EXE
PID:4220 -
\??\c:\tnhhhh.exec:\tnhhhh.exe44⤵
- Executes dropped EXE
PID:4968 -
\??\c:\jjjvv.exec:\jjjvv.exe45⤵
- Executes dropped EXE
PID:2476 -
\??\c:\rfffxff.exec:\rfffxff.exe46⤵
- Executes dropped EXE
PID:392 -
\??\c:\rlllfxx.exec:\rlllfxx.exe47⤵
- Executes dropped EXE
PID:4216 -
\??\c:\tbnhhh.exec:\tbnhhh.exe48⤵
- Executes dropped EXE
PID:2988 -
\??\c:\pjvvv.exec:\pjvvv.exe49⤵
- Executes dropped EXE
PID:1392 -
\??\c:\vjjvj.exec:\vjjvj.exe50⤵
- Executes dropped EXE
PID:4592 -
\??\c:\llxxxrl.exec:\llxxxrl.exe51⤵
- Executes dropped EXE
PID:4092 -
\??\c:\xlxrrrf.exec:\xlxrrrf.exe52⤵
- Executes dropped EXE
PID:3308 -
\??\c:\bthhhb.exec:\bthhhb.exe53⤵
- Executes dropped EXE
PID:1972 -
\??\c:\vvvpd.exec:\vvvpd.exe54⤵
- Executes dropped EXE
PID:2292 -
\??\c:\dddvv.exec:\dddvv.exe55⤵
- Executes dropped EXE
PID:2268 -
\??\c:\xxxllll.exec:\xxxllll.exe56⤵
- Executes dropped EXE
PID:5024 -
\??\c:\bhhbtb.exec:\bhhbtb.exe57⤵
- Executes dropped EXE
PID:1064 -
\??\c:\hhbbtt.exec:\hhbbtt.exe58⤵
- Executes dropped EXE
PID:1952 -
\??\c:\jdjjd.exec:\jdjjd.exe59⤵
- Executes dropped EXE
PID:4636 -
\??\c:\dddvp.exec:\dddvp.exe60⤵
- Executes dropped EXE
PID:1060 -
\??\c:\ffxfrrl.exec:\ffxfrrl.exe61⤵
- Executes dropped EXE
PID:3184 -
\??\c:\rrffrrf.exec:\rrffrrf.exe62⤵
- Executes dropped EXE
PID:2488 -
\??\c:\nthhbb.exec:\nthhbb.exe63⤵
- Executes dropped EXE
PID:1356 -
\??\c:\vvvvp.exec:\vvvvp.exe64⤵
- Executes dropped EXE
PID:3328 -
\??\c:\vpdvv.exec:\vpdvv.exe65⤵
- Executes dropped EXE
PID:4192 -
\??\c:\rflrrxr.exec:\rflrrxr.exe66⤵PID:4176
-
\??\c:\nbtttb.exec:\nbtttb.exe67⤵PID:4260
-
\??\c:\nnhnnn.exec:\nnhnnn.exe68⤵PID:4284
-
\??\c:\ppddj.exec:\ppddj.exe69⤵PID:4932
-
\??\c:\jjdvd.exec:\jjdvd.exe70⤵PID:1596
-
\??\c:\1fflfll.exec:\1fflfll.exe71⤵PID:3056
-
\??\c:\fxlllll.exec:\fxlllll.exe72⤵PID:3296
-
\??\c:\ttbhnn.exec:\ttbhnn.exe73⤵PID:1924
-
\??\c:\nhbbbh.exec:\nhbbbh.exe74⤵PID:4276
-
\??\c:\pppjp.exec:\pppjp.exe75⤵PID:5100
-
\??\c:\vvpjp.exec:\vvpjp.exe76⤵PID:4660
-
\??\c:\lxfllff.exec:\lxfllff.exe77⤵PID:4148
-
\??\c:\lfxxflr.exec:\lfxxflr.exe78⤵PID:3124
-
\??\c:\htbbbb.exec:\htbbbb.exe79⤵PID:3960
-
\??\c:\tthhhh.exec:\tthhhh.exe80⤵PID:1544
-
\??\c:\djjjp.exec:\djjjp.exe81⤵PID:4012
-
\??\c:\xllfxxr.exec:\xllfxxr.exe82⤵PID:1016
-
\??\c:\fxxflxf.exec:\fxxflxf.exe83⤵PID:1812
-
\??\c:\9nnnnh.exec:\9nnnnh.exe84⤵PID:4700
-
\??\c:\jdjjj.exec:\jdjjj.exe85⤵PID:4232
-
\??\c:\frxxrll.exec:\frxxrll.exe86⤵PID:2792
-
\??\c:\tthhbb.exec:\tthhbb.exe87⤵PID:4412
-
\??\c:\jjpvv.exec:\jjpvv.exe88⤵PID:4164
-
\??\c:\fflfflf.exec:\fflfflf.exe89⤵PID:2024
-
\??\c:\lffffll.exec:\lffffll.exe90⤵PID:1068
-
\??\c:\nnhhtn.exec:\nnhhtn.exe91⤵PID:224
-
\??\c:\vpvvv.exec:\vpvvv.exe92⤵PID:4220
-
\??\c:\xrlfxrr.exec:\xrlfxrr.exe93⤵PID:4508
-
\??\c:\3nnnbb.exec:\3nnnbb.exe94⤵PID:2420
-
\??\c:\ttnhnn.exec:\ttnhnn.exe95⤵PID:3132
-
\??\c:\jpjdv.exec:\jpjdv.exe96⤵PID:3608
-
\??\c:\rlxrxxl.exec:\rlxrxxl.exe97⤵PID:1832
-
\??\c:\xxfxllf.exec:\xxfxllf.exe98⤵PID:2972
-
\??\c:\ttbnnt.exec:\ttbnnt.exe99⤵PID:1520
-
\??\c:\bthbnh.exec:\bthbnh.exe100⤵PID:3392
-
\??\c:\jppdv.exec:\jppdv.exe101⤵PID:3308
-
\??\c:\lfrlflx.exec:\lfrlflx.exe102⤵PID:2956
-
\??\c:\hbnhhh.exec:\hbnhhh.exe103⤵PID:4792
-
\??\c:\bntttt.exec:\bntttt.exe104⤵PID:2896
-
\??\c:\pjpjv.exec:\pjpjv.exe105⤵PID:2872
-
\??\c:\ffrrxxx.exec:\ffrrxxx.exe106⤵PID:608
-
\??\c:\hbbbbt.exec:\hbbbbt.exe107⤵PID:3880
-
\??\c:\bbbnhh.exec:\bbbnhh.exe108⤵PID:4636
-
\??\c:\jvpjv.exec:\jvpjv.exe109⤵PID:4716
-
\??\c:\xfrxrxl.exec:\xfrxrxl.exe110⤵PID:1760
-
\??\c:\ntthbb.exec:\ntthbb.exe111⤵PID:3388
-
\??\c:\ddjvp.exec:\ddjvp.exe112⤵PID:3288
-
\??\c:\jvvjv.exec:\jvvjv.exe113⤵PID:3328
-
\??\c:\xrxrllr.exec:\xrxrllr.exe114⤵PID:4192
-
\??\c:\hbbbbt.exec:\hbbbbt.exe115⤵PID:3128
-
\??\c:\vpjpj.exec:\vpjpj.exe116⤵PID:3464
-
\??\c:\dvvpj.exec:\dvvpj.exe117⤵PID:1884
-
\??\c:\xlrlrrf.exec:\xlrlrrf.exe118⤵PID:3552
-
\??\c:\htnhhh.exec:\htnhhh.exe119⤵PID:4228
-
\??\c:\nhtntn.exec:\nhtntn.exe120⤵PID:2280
-
\??\c:\vvjdv.exec:\vvjdv.exe121⤵PID:3296
-
\??\c:\9jvjd.exec:\9jvjd.exe122⤵PID:4832
-
\??\c:\rllrffx.exec:\rllrffx.exe123⤵PID:4728
-
\??\c:\fxrllll.exec:\fxrllll.exe124⤵PID:4948
-
\??\c:\nbnbbh.exec:\nbnbbh.exe125⤵PID:3520
-
\??\c:\ppdjj.exec:\ppdjj.exe126⤵PID:1608
-
\??\c:\fxxlfrl.exec:\fxxlfrl.exe127⤵PID:3796
-
\??\c:\3lrlffr.exec:\3lrlffr.exe128⤵PID:2068
-
\??\c:\thnbnn.exec:\thnbnn.exe129⤵PID:4956
-
\??\c:\xrrxrrx.exec:\xrrxrrx.exe130⤵PID:1604
-
\??\c:\9lrlxxf.exec:\9lrlxxf.exe131⤵PID:1376
-
\??\c:\pdppp.exec:\pdppp.exe132⤵PID:4884
-
\??\c:\rllfxxr.exec:\rllfxxr.exe133⤵PID:4404
-
\??\c:\nntnnn.exec:\nntnnn.exe134⤵PID:2104
-
\??\c:\dvdvd.exec:\dvdvd.exe135⤵PID:4820
-
\??\c:\rlffffx.exec:\rlffffx.exe136⤵PID:232
-
\??\c:\nbtbtn.exec:\nbtbtn.exe137⤵PID:1704
-
\??\c:\vdpdv.exec:\vdpdv.exe138⤵PID:1620
-
\??\c:\ffrlrrr.exec:\ffrlrrr.exe139⤵PID:2440
-
\??\c:\nhbbtt.exec:\nhbbtt.exe140⤵PID:3516
-
\??\c:\vvddd.exec:\vvddd.exe141⤵PID:4588
-
\??\c:\3rrrllf.exec:\3rrrllf.exe142⤵PID:3152
-
\??\c:\bhnnhh.exec:\bhnnhh.exe143⤵PID:3244
-
\??\c:\jvvdj.exec:\jvvdj.exe144⤵PID:1392
-
\??\c:\9fflflf.exec:\9fflflf.exe145⤵PID:3304
-
\??\c:\nhtthh.exec:\nhtthh.exe146⤵PID:908
-
\??\c:\nbhtnn.exec:\nbhtnn.exe147⤵PID:8
-
\??\c:\jvpvv.exec:\jvpvv.exe148⤵PID:3308
-
\??\c:\rlxrrrl.exec:\rlxrrrl.exe149⤵PID:3640
-
\??\c:\rrxrfxf.exec:\rrxrfxf.exe150⤵PID:4792
-
\??\c:\5bbttt.exec:\5bbttt.exe151⤵PID:4584
-
\??\c:\3htbhb.exec:\3htbhb.exe152⤵PID:4624
-
\??\c:\vvvdv.exec:\vvvdv.exe153⤵PID:1060
-
\??\c:\pdjpj.exec:\pdjpj.exe154⤵PID:1728
-
\??\c:\lrxxfff.exec:\lrxxfff.exe155⤵PID:5036
-
\??\c:\llfrlrl.exec:\llfrlrl.exe156⤵PID:1272
-
\??\c:\bttntt.exec:\bttntt.exe157⤵PID:3760
-
\??\c:\dddvp.exec:\dddvp.exe158⤵PID:2912
-
\??\c:\jpvjj.exec:\jpvjj.exe159⤵PID:4932
-
\??\c:\xflffll.exec:\xflffll.exe160⤵PID:3696
-
\??\c:\fllrlfr.exec:\fllrlfr.exe161⤵PID:940
-
\??\c:\bnthbt.exec:\bnthbt.exe162⤵PID:4960
-
\??\c:\bbnhhh.exec:\bbnhhh.exe163⤵PID:5064
-
\??\c:\ddvpj.exec:\ddvpj.exe164⤵PID:2592
-
\??\c:\lflxfll.exec:\lflxfll.exe165⤵PID:2008
-
\??\c:\hbthhh.exec:\hbthhh.exe166⤵PID:1008
-
\??\c:\tnbbhh.exec:\tnbbhh.exe167⤵PID:3520
-
\??\c:\vjjjj.exec:\vjjjj.exe168⤵PID:4692
-
\??\c:\rfxrrrx.exec:\rfxrrrx.exe169⤵PID:3796
-
\??\c:\5nnbht.exec:\5nnbht.exe170⤵PID:2936
-
\??\c:\ntnnnt.exec:\ntnnnt.exe171⤵PID:1812
-
\??\c:\jdpjd.exec:\jdpjd.exe172⤵PID:4700
-
\??\c:\xxllrrl.exec:\xxllrrl.exe173⤵PID:4232
-
\??\c:\ntttnt.exec:\ntttnt.exe174⤵PID:4884
-
\??\c:\dvdvj.exec:\dvdvj.exe175⤵PID:2656
-
\??\c:\lxllxxl.exec:\lxllxxl.exe176⤵PID:3136
-
\??\c:\7tttbb.exec:\7tttbb.exe177⤵PID:1912
-
\??\c:\3ppvd.exec:\3ppvd.exe178⤵PID:2480
-
\??\c:\dvjpv.exec:\dvjpv.exe179⤵PID:1704
-
\??\c:\fxlfflr.exec:\fxlfflr.exe180⤵PID:3052
-
\??\c:\hbhttb.exec:\hbhttb.exe181⤵PID:2440
-
\??\c:\ddjjd.exec:\ddjjd.exe182⤵PID:3516
-
\??\c:\xlrxxff.exec:\xlrxxff.exe183⤵PID:1660
-
\??\c:\bhtbhn.exec:\bhtbhn.exe184⤵PID:540
-
\??\c:\pdjdd.exec:\pdjdd.exe185⤵PID:1804
-
\??\c:\djppv.exec:\djppv.exe186⤵PID:3700
-
\??\c:\nbbnnh.exec:\nbbnnh.exe187⤵PID:3276
-
\??\c:\vjvpv.exec:\vjvpv.exe188⤵PID:4816
-
\??\c:\nhhbbb.exec:\nhhbbb.exe189⤵PID:884
-
\??\c:\pppdv.exec:\pppdv.exe190⤵PID:2956
-
\??\c:\nthtnn.exec:\nthtnn.exe191⤵PID:368
-
\??\c:\3ddvp.exec:\3ddvp.exe192⤵PID:4172
-
\??\c:\pvdjv.exec:\pvdjv.exe193⤵PID:1496
-
\??\c:\lxlffxx.exec:\lxlffxx.exe194⤵PID:2088
-
\??\c:\nbtbht.exec:\nbtbht.exe195⤵PID:1412
-
\??\c:\vvpvp.exec:\vvpvp.exe196⤵PID:4036
-
\??\c:\dpjdj.exec:\dpjdj.exe197⤵PID:3388
-
\??\c:\xrxrlll.exec:\xrxrlll.exe198⤵PID:1808
-
\??\c:\nbbbbh.exec:\nbbbbh.exe199⤵PID:4156
-
\??\c:\3pjdd.exec:\3pjdd.exe200⤵PID:2912
-
\??\c:\llflffr.exec:\llflffr.exe201⤵PID:4932
-
\??\c:\lfxrflf.exec:\lfxrflf.exe202⤵PID:3056
-
\??\c:\ntthth.exec:\ntthth.exe203⤵PID:5004
-
\??\c:\jjpvd.exec:\jjpvd.exe204⤵PID:872
-
\??\c:\rlxrffr.exec:\rlxrffr.exe205⤵PID:4148
-
\??\c:\1bbttn.exec:\1bbttn.exe206⤵PID:3124
-
\??\c:\ppjpj.exec:\ppjpj.exe207⤵PID:4948
-
\??\c:\dvddv.exec:\dvddv.exe208⤵PID:4776
-
\??\c:\lxlxxff.exec:\lxlxxff.exe209⤵PID:1544
-
\??\c:\bnttnt.exec:\bnttnt.exe210⤵PID:4012
-
\??\c:\nhhhbt.exec:\nhhhbt.exe211⤵PID:2372
-
\??\c:\vdddv.exec:\vdddv.exe212⤵PID:1812
-
\??\c:\xrrxrfx.exec:\xrrxrfx.exe213⤵PID:2784
-
\??\c:\htttnn.exec:\htttnn.exe214⤵PID:4232
-
\??\c:\thhhht.exec:\thhhht.exe215⤵PID:2576
-
\??\c:\jjpdv.exec:\jjpdv.exe216⤵PID:4500
-
\??\c:\lllfxxx.exec:\lllfxxx.exe217⤵PID:3136
-
\??\c:\tnttbb.exec:\tnttbb.exe218⤵PID:3488
-
\??\c:\htbttt.exec:\htbttt.exe219⤵PID:4784
-
\??\c:\vppjj.exec:\vppjj.exe220⤵PID:2952
-
\??\c:\vvdpj.exec:\vvdpj.exe221⤵PID:4220
-
\??\c:\frrrlrl.exec:\frrrlrl.exe222⤵PID:3832
-
\??\c:\nhnnnn.exec:\nhnnnn.exe223⤵PID:2284
-
\??\c:\nhthbb.exec:\nhthbb.exe224⤵PID:1708
-
\??\c:\1djjd.exec:\1djjd.exe225⤵PID:1832
-
\??\c:\lxrrlrf.exec:\lxrrlrf.exe226⤵PID:1392
-
\??\c:\nntttt.exec:\nntttt.exe227⤵PID:3584
-
\??\c:\thbtnn.exec:\thbtnn.exe228⤵PID:3276
-
\??\c:\dvvpj.exec:\dvvpj.exe229⤵PID:652
-
\??\c:\3dvpj.exec:\3dvpj.exe230⤵PID:2288
-
\??\c:\rfflfff.exec:\rfflfff.exe231⤵PID:1176
-
\??\c:\nbttnn.exec:\nbttnn.exe232⤵PID:3376
-
\??\c:\btbtbt.exec:\btbtbt.exe233⤵PID:2964
-
\??\c:\5dddv.exec:\5dddv.exe234⤵PID:3976
-
\??\c:\rxrxlrl.exec:\rxrxlrl.exe235⤵PID:4668
-
\??\c:\nhnhnh.exec:\nhnhnh.exe236⤵PID:4584
-
\??\c:\ttbtbb.exec:\ttbtbb.exe237⤵PID:464
-
\??\c:\jdvpj.exec:\jdvpj.exe238⤵PID:1060
-
\??\c:\rrfxrff.exec:\rrfxrff.exe239⤵PID:1412
-
\??\c:\rllfrrl.exec:\rllfrrl.exe240⤵PID:3328
-
\??\c:\tnhtht.exec:\tnhtht.exe241⤵PID:1484
-
\??\c:\jpppv.exec:\jpppv.exe242⤵PID:4020